Analysis

  • max time kernel
    188s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 15:00

General

  • Target

    5b39e5c7bb02f3515fc1e49565414304e63350883e405e9e6250cda0a58ac340.exe

  • Size

    100KB

  • MD5

    7d175304c23a577a3a838e6e1f29a6ee

  • SHA1

    482cc4350f7e207d3857922f1f898296015b16f6

  • SHA256

    5b39e5c7bb02f3515fc1e49565414304e63350883e405e9e6250cda0a58ac340

  • SHA512

    65eef27921418bb2169ba3d83e85e25ca65c14ed16cfa7c8a6dd8bba0f33130db30c71da6afa5de608a308907ce86787227f8591b3737d63b801860db52ec93b

  • SSDEEP

    1536:JytGS82NTzw1MGAc4ohrPXo+73Rez8b0SyuNIjnZq:GwMurPX7CuCnY

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b39e5c7bb02f3515fc1e49565414304e63350883e405e9e6250cda0a58ac340.exe
    "C:\Users\Admin\AppData\Local\Temp\5b39e5c7bb02f3515fc1e49565414304e63350883e405e9e6250cda0a58ac340.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Users\Admin\zioof.exe
      "C:\Users\Admin\zioof.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zioof.exe

    Filesize

    100KB

    MD5

    a581e1f8477e4365799e3631fdffb3a8

    SHA1

    b5557522f1e2783c335badd7dee7db9715b55ee8

    SHA256

    c0b4d977afa6d9156ab551b6f43a1de3abc9a15659b3c77e3b92b30a5995e640

    SHA512

    9b9f179b82d1d27c883885d9c368d99b0e36730a5aa599968fd4405efb8da955b238e3b760036f398b4e6a73ef0f970b6e749f4147526656722d929ce7df83e7

  • C:\Users\Admin\zioof.exe

    Filesize

    100KB

    MD5

    a581e1f8477e4365799e3631fdffb3a8

    SHA1

    b5557522f1e2783c335badd7dee7db9715b55ee8

    SHA256

    c0b4d977afa6d9156ab551b6f43a1de3abc9a15659b3c77e3b92b30a5995e640

    SHA512

    9b9f179b82d1d27c883885d9c368d99b0e36730a5aa599968fd4405efb8da955b238e3b760036f398b4e6a73ef0f970b6e749f4147526656722d929ce7df83e7

  • memory/4688-134-0x0000000000000000-mapping.dmp